Sciweavers

297 search results - page 54 / 60
» Compositional noisy-logical learning
Sort
View
RAID
2007
Springer
14 years 1 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
ATAL
2005
Springer
14 years 1 months ago
Matchmaking multi-party interactions using historical performance data
Matchmaking will be an important component of future agent and agent-like systems, such as the semantic web. Most research on matchmaking has been directed toward sophisticated ma...
David Lambert, David Robertson
SELMAS
2004
Springer
14 years 25 days ago
Aspectizing Multi-agent Systems: From Architecture to Implementation
Agent architectures have to cope with a number of internal properties (concerns), such as autonomy, learning, and mobility. As the agent complexity increases, these agent propertie...
Alessandro F. Garcia, Uirá Kulesza, Carlos ...
ITS
2010
Springer
169views Multimedia» more  ITS 2010»
14 years 8 days ago
Automatic Question Generation for Literature Review Writing Support
This paper presents a novel Automatic Question Generation (AQG) approach that generates trigger questions as a form of support for students’ learning through writing. The approac...
Ming Liu, Rafael A. Calvo, Vasile Rus
CAV
1998
Springer
103views Hardware» more  CAV 1998»
13 years 11 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...